Each breach includes several questions grouped as follows:

The Teaching Notes include key points1 for student answers, sample student errors, and sample responses. The authors recommend that the instructor provide the students with the corresponding scoring rubric(s) (see Figure 1) before the students work on each breach, explaining how the instructor will assign points for each assigned requirement. Instructors assign points by evaluating the depth of the students’ responses, ranging from missing, to basic developing, to proficient. Two points are offered for each category of answer to provide instructors with low and high grading options for each category. The total points available on each breach depends on the number of requirements the instructor assigns.

As noted in Appendix A in the case, instructors may choose to emphasize how companies disclose cybersecurity breach-related expenses in their financial statements. Solutions to this extension start in Section VI.

Paige Thompson,...

You do not currently have access to this content.